Rights Contact Login For More Details
- Wiley
More About This Title Auditor's Guide to IT Auditing, Second Edition +Software Demo
- English
English
Many auditors are unfamiliar with the techniques they need to know to efficiently and effectively determine whether information systems are adequately protected. Now in a Second Edition, Auditor's Guide to IT Auditing presents an easy, practical guide for auditors that can be applied to all computing environments.
- Follows the approach used by the Information System Audit and Control Association's model curriculum, making this book a practical approach to IS auditing
- Serves as an excellent study guide for those preparing for the CISA and CISM exams
- Includes discussion of risk evaluation methodologies, new regulations, SOX, privacy, banking, IT governance, CobiT, outsourcing, network management, and the Cloud
- Includes a link to an education version of IDEA--Data Analysis Software
As networks and enterprise resource planning systems bring resources together, and as increasing privacy violations threaten more organization, information systems integrity becomes more important than ever. Auditor's Guide to IT Auditing, Second Edition empowers auditors to effectively gauge the adequacy and effectiveness of information systems controls.
- English
English
RICHARD E. CASCARINO, MBA, CIA, CISA, CISM, is a consultant and lecturer with over thirty years' experience in internal, forensic, risk, and computer auditing. He is Managing Director of Richard Cascarino & Associates, a successful audit training and consultancy company. For the last twenty-five years, they have been providing consultancy and professional development services to clients throughout the southern African region as well as Europe, the Middle East, and the United States. He is a past president of the Institute of Internal Auditors South Africa (IIA SA), was the founding Regional Director of the Southern African Region of the IIA Inc., and is a member of both the Information Systems Audit and Control Association and the Association of Certified Fraud Examiners.
- English
English
PART I: IT AUDIT PROCESS 1
Chapter 1: Technology and Audit 3
Technology and Audit 4
Batch and Online Systems 8
Electronic Data Interchange 20
Electronic Business 21
Cloud Computing 22
Chapter 2: IT Audit Function Knowledge 25
Information Technology Auditing 25
What Is Management? 26
Management Process 26
Understanding the Organization’s Business 27
Establishing the Needs 27
Identifying Key Activities 27
Establish Performance Objectives 27
Decide the Control Strategies 27
Implement and Monitor the Controls 28
Executive Management’s Responsibility and Corporate Governance 28
Audit Role 28
Conceptual Foundation 29
Professionalism within the IT Auditing Function 29
Relationship of Internal IT Audit to the External Auditor 30
Relationship of IT Audit to Other Company Audit Activities 30
Audit Charter 30
Charter Content 30
Outsourcing the IT Audit Activity 31
Regulation, Control, and Standards 31
Chapter 3: IT Risk and Fundamental Auditing Concepts 33
Computer Risks and Exposures 33
Effect of Risk 35
Audit and Risk 36
Audit Evidence 37
Conducting an IT Risk-Assessment Process 38
NIST SP 800 30 Framework 38
ISO 27005 39
The “Cascarino Cube” 39
Reliability of Audit Evidence 44
Audit Evidence Procedures 45
Responsibilities for Fraud Detection and Prevention 46
Notes 46
Chapter 4: Standards and Guidelines for IT Auditing 47
IIA Standards 47
Code of Ethics 48
Advisory 48
Aids 48
Standards for the Professional Performance of Internal Auditing 48
ISACA Standards 49
ISACA Code of Ethics 50
COSO: Internal Control Standards 50
BS 7799 and ISO 17799: IT Security 52
NIST 53
BSI Baselines 54
Note 55
Chapter 5: Internal Controls Concepts Knowledge 57
Internal Controls 57
Cost/Benefit Considerations 59
Internal Control Objectives 59
Types of Internal Controls 60
Systems of Internal Control 61
Elements of Internal Control 61
Manual and Automated Systems 62
Control Procedures 63
Application Controls 63
Control Objectives and Risks 64
General Control Objectives 64
Data and Transactions Objectives 64
Program Control Objectives 66
Corporate IT Governance 66
COSO and Information Technology 68
Governance Frameworks 70
Notes 71
Chapter 6: Risk Management of the IT Function 73
Nature of Risk 73
Risk-Analysis Software 74
Auditing in General 75
Elements of Risk Analysis 77
Defining the Audit Universe 77
Computer System Threats 79
Risk Management 80
Notes 83
Chapter 7: Audit Planning Process 85
Benefits of an Audit Plan 85
Structure of the Plan 89
Types of Audit 91
Chapter 8: Audit Management 93
Planning 93
Audit Mission 94
IT Audit Mission 94
Organization of the Function 95
Staffing 95
IT Audit as a Support Function 97
Planning 97
Business Information Systems 98
Integrated IT Auditor versus Integrated IT Audit 98
Auditees as Part of the Audit Team 100
Application Audit Tools 100
Advanced Systems 100
Specialist Auditor 101
IT Audit Quality Assurance 101
Chapter 9: Audit Evidence Process 103
Audit Evidence 103
Audit Evidence Procedures 103
Criteria for Success 104
Statistical Sampling 105
Why Sample? 106
Judgmental (or Non-Statistical) Sampling 106
Statistical Approach 107
Sampling Risk 107
Assessing Sampling Risk 108
Planning a Sampling Application 109
Calculating Sample Size 111
Quantitative Methods 111
Project-Scheduling Techniques 116
Simulations 117
Computer-Assisted Audit Solutions 118
Generalized Audit Software 118
Application and Industry-Related Audit Software 119
Customized Audit Software 120
Information-Retrieval Software 120
Utilities 120
On-Line Inquiry 120
Conventional Programming Languages 120
Microcomputer-Based Software 121
Test Transaction Techniques 121
Chapter 10: Audit Reporting Follow-up 123
Audit Reporting 123
Interim Reporting 124
Closing Conferences 124
Written Reports 124
Clear Writing Techniques 125
Preparing to Write 126
Basic Audit Report 127
Executive Summary 127
Detailed Findings 128
Polishing the Report 129
Distributing the Report 129
Follow-up Reporting 129
Types of Follow-up Action 130
PART II: INFORMATION TECHNOLOGY GOVERNANCE 131
Chapter 11: Management 133
IT Infrastructures 133
Project-Based Functions 134
Quality Control 138
Operations and Production 139
Technical Services 140
Performance Measurement and Reporting 140
Measurement Implementation 141
Notes 145
Chapter 12: Strategic Planning 147
Strategic Management Process 147
Strategic Drivers 148
New Audit Revolution 149
Leveraging IT 149
Business Process Re-Engineering Motivation 150
IT as an Enabler of Re-Engineering 151
Dangers of Change 152
System Models 152
Information Resource Management 153
Strategic Planning for IT 153
Decision Support Systems 155
Steering Committees 156
Strategic Focus 156
Auditing Strategic Planning 156
Design the Audit Procedures 158
Note 158
Chapter 13: Management Issues 159
Privacy 161
Copyrights, Trademarks, and Patents 162
Ethical Issues 162
Corporate Codes of Conduct 163
IT Governance 164
Sarbanes-Oxley Act 166
Payment Card Industry Data Security Standards 166
Housekeeping 167
Notes 167
Chapter 14: Support Tools and Frameworks 169
General Frameworks 169
COSO: Internal Control Standards 172
Other Standards 173
Governance Frameworks 176
Note 178
Chapter 15: Governance Techniques 179
Change Control 179
Problem Management 181
Auditing Change Control 181
Operational Reviews 182
Performance Measurement 182
ISO 9000 Reviews 184
PART III: SYSTEMS AND INFRASTRUCTURE LIFECYCLE MANAGEMENT 185
Chapter 16: Information Systems Planning 187
Stakeholders 187
Operations 188
Systems Development 189
Technical Support 189
Other System Users 191
Segregation of Duties 191
Personnel Practices 192
Object-Oriented Systems Analysis 194
Enterprise Resource Planning 194
Cloud Computing 195
Notes 197
Chapter 17: Information Management and Usage 199
What Are Advanced Systems? 199
Service Delivery and Management 201
Computer-Assisted Audit Tools and Techniques 204
Notes 205
Chapter 18: Development, Acquisition, and Maintenance of Information Systems 207
Programming Computers 207
Program Conversions 209
No Thanks Systems Development Exposures 209
Systems Development Controls 210
Systems Development Life Cycle Control: Control Objectives 210
Micro-Based Systems 212
Cloud Computing Applications 212
Note 213
Chapter 19: Impact of Information Technology on the Business Processes and Solutions 215
Impact 215
Continuous Monitoring 216
Business Process Outsourcing 218
E-Business 219
Notes 220
Chapter 20: Software Development 221
Developing a System 221
Change Control 225
Why Do Systems Fail? 225
Auditor’s Role in Software Development 227
Chapter 21: Audit and Control of Purchased Packages and Services 229
IT Vendors 230
Request For Information 231
Requirements Definition 231
Request for Proposal 232
Installation 233
Systems Maintenance 233
Systems Maintenance Review 234
Outsourcing 234
SAS 70 Reports 234
Chapter 22: Audit Role in Feasibility Studies and Conversions 237
Feasibility Success Factors 237
Conversion Success Factors 240
Chapter 23: Audit and Development of Application Controls 243
What Are Systems? 243
Classifying Systems 244
Controlling Systems 244
Control Stages 245
Control Objectives of Business Systems 245
General Control Objectives 246
CAATs and Their Role in Business Systems Auditing 247
Common Problems 249
Audit Procedures 250
CAAT Use in Non-Computerized Areas 250
Designing an Appropriate Audit Program 250
PART IV: INFORMATION TECHNOLOGY SERVICE DELIVERY AND SUPPORT 253
Chapter 24: Technical Infrastructure 255
Auditing the Technical Infrastructure 257
Infrastructure Changes 259
Computer Operations Controls 260
Operations Exposures 261
Operations Controls 261
Personnel Controls 261
Supervisory Controls 262
Information Security 262
Operations Audits 263
Notes 264
Chapter 25: Service-Center Management 265
Private Sector Preparedness (PS Prep) 266
Continuity Management and Disaster Recovery 266
Managing Service-Center Change 269
Notes 269
PART V: PROTECTION OF INFORMATION ASSETS 271
Chapter 26: Information Assets Security Management 273
What Is Information Systems Security? 273
Control Techniques 276
Workstation Security 276
Physical Security 276
Logical Security 277
User Authentication 277
Communications Security 277
Encryption 277
How Encryption Works 278
Encryption Weaknesses 279
Potential Encryption 280
Data Integrity 280
Double Public Key Encryption 281
Steganography 281
Information Security Policy 282
Notes 282
Chapter 27: Logical Information Technology Security 283
Computer Operating Systems 283
Tailoring the Operating System 284
Auditing the Operating System 285
Security 286
Criteria 286
Security Systems: Resource Access Control Facility 287
Auditing RACF 288
Access Control Facility 2 289
Top Secret 290
User Authentication 291
Bypass Mechanisms 293
Security Testing Methodologies 293
Notes 295
Chapter 28: Applied Information Technology Security 297
Communications and Network Security 297
Network Protection 298
Hardening the Operating Environment 300
Client Server and Other Environments 301
Firewalls and Other Protection Resources 301
Intrusion-Detection Systems 303
Note 304
Chapter 29: Physical and Environmental Security 305
Control Mechanisms 306
Implementing the Controls 310
PART VI: BUSINESS CONTINUITY AND DISASTER RECOVERY 311
Chapter 30: Protection of the Information Technology Architecture and Assets: Disaster-Recovery Planning 313
Risk Reassessment 314
Disaster—Before and After 315
Consequences of Disruption 317
Where to Start 317
Testing the Plan 319
Auditing the Plan 320
Chapter 31: Displacement Control 323
Insurance 323
Self- Insurance 327
PART VII: ADVANCED IT AUDITING 329
Chapter 32: Auditing E-commerce Systems 331
E-Commerce and Electronic Data Interchange: What Is It? 331
Opportunities and Threats 332
Risk Factors 335
Threat List 335
Security Technology 336
“Layer” Concept 336
Authentication 336
Encryption 337
Trading Partner Agreements 338
Risks and Controls within EDI and E-Commerce 338
E-Commerce and Auditability 340
Compliance Auditing 340
E-Commerce Audit Approach 341
Audit Tools and Techniques 341
Auditing Security Control Structures 342
Computer-Assisted Audit Techniques 343
Notes 343
Chapter 33: Auditing UNIX/Linux 345
History 345
Security and Control in a UNIX/Linux System 347
Architecture 348
UNIX Security 348
Services 349
Daemons 350
Auditing UNIX 350
Scrutiny of Logs 351
Audit Tools in the Public Domain 351
UNIX Password File 352
Auditing UNIX Passwords 353
Chapter 34: Auditing Windows VISTA and Windows 7 355
History 355
NT and Its Derivatives 356
Auditing Windows Vista/Windows 7 357
Password Protection 358
VISTA/Windows 7 359
Security Checklist 359
Chapter 35: Foiling the System Hackers 361
Chapter 36: Preventing and Investigating Information Technology Fraud 367
Preventing Fraud 367
Investgation 369
Identity Theft 376
Note 376
Appendix A Ethics and Standards for the IS Auditor 377
ISACA Code of Professional Ethics 377
Relationship of Standards to Guidelines and Procedures 378
Appendix B Audit Program for Application Systems Auditing 379
Appendix C Logical Access Control Audit Program 393
Appendix D Audit Program for Auditing UNIX/Linux Environments 401
Appendix E Audit Program for Auditing Windows VISTA and Windows 7 Environments 407
About the Author 415
About the Website 417
Index 419